0% found this document useful (0 votes)
2 views9 pages

Cyber Security Computer Security

Download as docx, pdf, or txt
Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1/ 9

Cyber Security Computer security, cybersecurity or information technology security (IT

security) is the protection of computer systems and networks from information disclosure, theft of or
damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of
the services they provide.

The field is becoming increasingly significant due to the increased reliance on computer systems, the
Internet and wireless network standards such as Bluetooth and Wi-Fi, and due to the growth of “smart”
devices, including smartphones, televisions, and the various devices that constitute the “Internet of
things”.

The government of India is taking many initiatives to enhance cybersecurity. With the rapid development
of information technology, it is critical to provide a safe and secure cyberspace. The topic, ‘Cyber
Security’ comes under GS-III syllabus of the IAS Exam. This article will provide you with relevant facts
about cybersecurity.

What is Cyber?
The term, ‘Cyber’ is used in relation to the culture of computers, information technology, and virtual
reality. The connection between internet ecosystems forms cyberspace. The threat to cyberspace leads
to an issue and gives rise to the need for cybersecurity

Threats to Cyberspace:

1. Interconnectedness of Sectors
2. Increase in the number of exposure points
3. Concentration of assets

As per the NITI Aayog report, the threats to cyberspace have increased dramatically over the last 10
years. The cyber attacks lead to the exposure of:

1. Sensitive information
2. Personal information and
3. Business information

The need for Cyber Security


Cyber Security protects the cyberspace from the following:

1. Cyber Attacks
2. Damage to Cyberspace
3. Misuse of Cyberspace
4. Economic Espionage
Cyber Security – Evolution
With the introduction of cyberattacks, cybersecurity initiatives have evolved. They are mentioned in the
table below:

Evolution of Cyber Security

Issues Cyber Security Initiatives

Virus (1990s)  Anti-Virus


 Firewalls
Worms (2000) Intrusion Detection and Prevention

Botnets (2000s – Present) DLP, Application-aware Firewalls, SIM

APT Insiders (Present) Network Flow Analysis

Cyber Threats and Cyber Security


There are types of cyber attacks that have evolved over a period of time:

1. Virus – It is a malware that self-replicates and spreads by inserting copies of itself into other executable
code or documents.
2. Hacking Websites – An unauthorized access to any website belonging in a personal or professional space
3. Malicious Codes – It is a kind of security threat where any code present in software tends to bring harmful
effects, breach the security of the system, or bring damage to the system.
4. Advanced Worm and Trojan – This is again a malware that camouflages as a regular software however
once accessed, brings damage to the hard drive, background systems and corrupts allocation systems
5. Identity Theft and Phishing – It is a cyber attack involving fraudulent emails posing as authorized entities in
order to induce people to reveal their information (personal and professional.)
6. DOS, DDOS – DOS stands for Denial-of-Service attack, and DDOS stands for Distributed Denial-of-Service
attack. The attackers make the machine or network unavailable by disrupting services of the host network
through the flood of superfluous requests to overload systems. And when such flooding of requests comes
from various ends, it is termed as DDOS.
7. Cyber Espionage – Usually when a government’s or important organization’s privacy is posed at risk due to
illegal use of computer networks to seek confidential information.
8. Cyber Warfare – Deliberately attacking the information systems through the use of computer technology to
disrupt the state’s activities, especially for military purposes.

Cyber Attacks in India


The topmost causes of cyber attacks are:

1. Phishing and Social Engineering


2. Malware
3. Spear Phishing
4. Denial of Service
5. Out of Date Software Ransomware

The table below gives the list of cyberattacks that India has witnessed in the past:
Cyber Attacks in India Description of the Cyber Attacks

Coronavirus Pandemic Microsoft has reported that cyber crooks are using Covid-19 situation in
Based Cyber Attack 2020 to defraud people through phishing and ransomware in India and the
world

Phishing Union Bank of India heist in July 2016

Wannacry Ransomware In May 2017, various computer networks in India were locked down by the
ransom-seeking hackers.

Data Theft In May 2017, the food tech company Zomato faced the theft of information of
17 million users.

Petya Ransomware Container handling functions at a terminal operated by the Danish firm AP
Moller-Maersk at Mumbai’s Jawaharlal Nehru Port Trust got affected

Mirai Botnet In September 2016, Mirai malware launched a DDoS attack on the website
of a well-known security expert.

Cyber Security – Who are the Cyber Attackers?


There are kinds of cyber players who harm cybersecurity:

 Cyber Criminals
 Cyber Terrorists
 Cyber Espionage
 Cyber Hacktivist

As per the Niti Ayog report, the following are the sets of the group behind the cybersecurity breaches

Outsiders

Internal Actors

State-affiliated actors

Multiple parties

Attacks in partnerships

Organized Criminal Groups

Find the difference between Malware and Virus by visiting the linked article.

Types op
Cyber Security – Cyber Swachhta Kendra
It is the Botnet Cleaning and Malware Analysis Centre under the Indian Computer Emergency Response
Team (CERT-In) under the Ministry of Electronics and Information Technology (MeitY). The aim of Cyber
Swachhta Kendra is to promote awareness among Indian citizens to secure their data in computers,
mobile phones, and other electronic devices.

Cyber Security – Indian Laws & Government Initiatives


There are various legislations that support cybersecurity in India. The table below mentions these:

Laws related to Cyber Important Facts


Security in India

Information and  Came into force in October 2000


Technology Act, 2000  Also called Indian Cyber Act
 Provide legal recognition to all e-transactions
 To protect online privacy and curb online crimes
Information Technology The amendments in the IT Act mentioned:
Amendment Act 2008
(ITAA)  ‘Data Privacy’
 Information Security
 Definition of Cyber Cafe
 Digital Signature
 Recognizing the role of CERT-In
 To authorize the inspector to investigate cyber offenses against DSP
who was given the charge earlier
National Cyber Security Indian Government is coming up with the National Cyber Security Strategy
Strategy 2020 2020 entailing the provisions to secure cyberspace in India. The cabinet’s nod
is pending and it will soon be out for the public.

Cyber Surakshit Bharat MeitY in collaboration with National e-Governance Division (NeGD) came up
Initiative with this initiative in 2018 to build a cyber-resilient IT set up

Cyber Security MCQs


Cyber security is the protection of systems, programmes, networks, devices, and data from cyber attacks with the
help of technology and processes. Its primary aim is to reduce cyber attacks and protect systems, networks, and
technologies from unauthorised exploitation.

Cyber Security Multiple-Choice Questions


1. In which of these a person is continually chased/followed by another person or a group of various people?

a. Identity theft

b. Stalking
c. Bullying

d. Phishing

Answer: (b) Stalking

2. Which of these is an antivirus program type?

a. Kaspersky

b. Quick heal

c. Mcafee

d. All of the above

Answer: (d) All of the above

3. A ____________ can be a hardware device or a software program that filters all the packets of data that comes
through a network, the internet, etc.

a. Firewall

b. Antivirus

c. Malware

d. Cookies

Answer: (a) Firewall

4. Which of these would refer to the exploration of the apt, ethical behaviours that are related to the digital media
platform and online environment?

a. Cybersecurity

b. Cybersafety

c. Cyberethics

d. Cyber low

Answer: (c) Cyberethics

5. Which of these is a technique that is used to verify a message’s integrity?

a. Message Digest

b. Protocol

c. Decryption algorithm
d. Digital signature

Answer: (a) Message Digest

6. Which of these ports and IP address scanners is popular among the users?

a. Ettercap

b. Snort

c. Angry IP Scanner

d. Cain and Abel

Answer: (c) Angry IP Scanner

7. Which of these is NOT a scanning type?

a. Null Scan

b. Xmas Tree Scan

c. SYN Stealth

d. Cloud Scan

Answer: (d) Cloud Scan

8. The Code Red is a sort of a ___________.

a. Video Editing Software

b. Computer Virus

c. Photo Editing Software

d. Antivirus Program

Answer: (b) Computer Virus

9. Which of these is also malicious software?

a. Badware

b. Malicious Ware

c. Malware

d. Ilegalware

Answer: (c) Malware


10. We use the transit time and the response time to measure a network’s ___________.

a. Reliability

b. Performance

c. Longevity

d. Security

Answer: (b) Performance

11. Which of these is the world’s very first antivirus program?

a. Tinkered

b. Creeper

c. Ray Tomlinson

d. Reaper

Answer: (d) Reaper

12. The Hacker who did break the SIPRNET system is ___________.

a. Kevin Poulsen

b. John von Neumann

c. Kevin Mitnick

d. John Draper

Answer: (a) Kevin Poulsen

13. Using the cipher algorithm, which of these types of text would be transformed?

a. Plain text

b. Scalar text

c. Complex text

d. Transformed text

Answer: (a) Plain text

14. Which of the following malware types does not clone or replicate itself through infection?

a. Viruses
b. Worms

c. Trojans

d. Rootkits

Answer: (c) Trojans

15. The DNS would translate any Domain name into ___________.

a. IP

b. URL

c. Binary

d. Hex

Answer: (b) URL

16. Which of these is usually referred to as the port number (default) of several web servers like apache?

a. 40

b. 20

c. 87

d. 80

Answer: (d) 80

17. Which of these is a sort of independent type of malicious program that would not require any host program?

a. Virus

b. Trap Door

c. Worm

d. Trojan Horse

Answer: (c) Worm

18. Which of these is NOT involved in the CIA Triad?

a. Confidentiality

b. Availability

c. Integrity
d. Authenticity

Answer: (d) Authenticity

19. Which of these is the oldest techniques used by hackers for phone hacking to make free calls?

a. Phishing

b. Phreaking

c. Spraining

d. Cracking

Answer: (b) Phreaking

20. Which of these is the very first hacker’s conference?

a. DEFCON

b. OSCON

c. SECTION

d. DEVON

Answer: (a) DEFCON

Cyber Security - Definition, Cyber Attacks, Need and


Laws
Cyber Security - Definition, Cyber Attacks, Need and
Laws

You might also like